Monday, 27 August 2018

Critical Flaw in Fortnite Android App Lets Hackers Install Malware

The Hacker News Daily Updates
Newsletter
cover

Top 5 Strategies to Prevent Ransomware Attacks

Thu, Sep 20, 2018 2:00 PM - 3:00 PM EDT

Download Now Sponsored
LATEST NEWS Aug 27, 2018

Critical Flaw in Fortnite Android App Lets Hackers Install Malware

Security researchers from Google have publicly disclosed an extremely serious security flaw in the first Fortnite installer for Android that could allow other apps installed on the targeted devices to manipulate installation process and load malware, instead of the Fortnite APK. Earlier this ...

Read More
Twitter Facebook LinkedIn

T-Mobile Hacked — 2 Million Customers' Personal Data Stolen

T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of "some" personal information of up to 2 million T-Mobile customers. The leaked information includes customers' name, billing zip code, phone number, email ...

Read More
Twitter Facebook LinkedIn

NSA Leaker 'Reality Winner' Gets More Than 5 Years in Prison

A former NSA contractor, who pleaded guilty to leaking a classified report on Russian hacking of the 2016 U.S. presidential election to an online news outlet last year, has been sentenced to five years and three months in prison. Reality Winner, a 26-year-old Georgia woman who held a top-secret ...

Read More
Twitter Facebook LinkedIn

Apple Forces Facebook VPN App Out of iOS Store for Stealing Users' Data

Facebook yesterday removed its mobile VPN app called Onavo Protect from the iOS App Store after Apple declared the app violated the iPhone maker's App Store guidelines on data collection. For those who are unaware, Onavo Protect is a Facebook-owned Virtual Private Network (VPN) app that was ...

Read More
Twitter Facebook LinkedIn

New Android Malware Framework Turns Apps Into Powerful Spyware

Security researchers have uncovered a new, powerful Android malware framework that is being used by cybercriminals to turn legitimate apps into spyware with extensive surveillance capabilities—as part of what seems to be a targeted espionage campaign. Legitimate Android applications when bundled ...

Read More
Twitter Facebook LinkedIn
cover

Top 5 Strategies to Prevent Ransomware Attacks

Thu, Sep 20, 2018 2:00 PM - 3:00 PM EDT

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment